| File name: | svcmc.dll |
| Full analysis: | https://app.any.run/tasks/bd8873ed-048a-418c-9166-1d2c74917381 |
| Verdict: | Malicious activity |
| Analysis date: | February 14, 2024, 18:42:45 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows |
| MD5: | EA327ED0A3243847F7CD87661E22E1DE |
| SHA1: | 450D54D5737164579416CA99AF1EB3FA1D4AAFF9 |
| SHA256: | CED4EE8A9814C243F0C157CDA900DEF172B95BB4BC8535E480FE432AB84B9175 |
| SSDEEP: | 98304:0iy6X0LC5QRfFUf6046RT4vJ/vByCD5oj0ylbSaad2NQ2Fk20tDTJw0Gl2r63az:0P3r63az |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, 32-bit, No debug, DLL |
| PEType: | PE32 |
| LinkerVersion: | 2.4 |
| CodeSize: | 5052416 |
| InitializedDataSize: | 8194560 |
| UninitializedDataSize: | 221696 |
| EntryPoint: | 0x1390 |
| OSVersion: | 6.1 |
| ImageVersion: | 1 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3700 | "C:\Windows\System32\rundll32.exe" "C:\Users\admin\AppData\Local\Temp\svcmc.dll", #1 | C:\Windows\System32\rundll32.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3700 | rundll32.exe | C:\Users\admin\AppData\Local\Temp\config | binary | |
MD5:C0C6436A790548C83E3B9D1FE7BFF54E | SHA256:90F2C979C04D55D3115E03AE5600A52BEF47FB834E9682875F117A75572DAAE7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3700 | rundll32.exe | GET | 200 | 38.180.61.247:30001 | http://38.180.61.247:30001/api/helper-first-register?buildVersion=02OO.b2b1Laa&md5=c648901695e275c8f2ad04b687a68ce2&proxyPassword=IhupV2Ip&proxyUsername=qY1vazyf&userId=fgozupZ8mt7ma05Fr6YRiJRw | unknown | text | 638 b | unknown |
3700 | rundll32.exe | GET | — | 38.180.61.247:30001 | http://38.180.61.247:30001/api/helper-first-register?buildVersion=02OO.b2b1Laa&md5=c648901695e275c8f2ad04b687a68ce2&proxyPassword=IhupV2Ip&proxyUsername=qY1vazyf&userId=fgozupZ8mt7ma05Fr6YRiJRw | unknown | — | — | unknown |
3700 | rundll32.exe | GET | 200 | 38.180.61.247:30001 | http://38.180.61.247:30001/api/helper-first-register?buildVersion=02OO.b2b1Laa&md5=c648901695e275c8f2ad04b687a68ce2&proxyPassword=IhupV2Ip&proxyUsername=qY1vazyf&userId=fgozupZ8mt7ma05Fr6YRiJRw | unknown | text | 638 b | unknown |
3700 | rundll32.exe | GET | 429 | 91.142.74.28:30001 | http://91.142.74.28:30001/api/helper-first-register?buildVersion=02OO.b2b1Laa&md5=c648901695e275c8f2ad04b687a68ce2&proxyPassword=IhupV2Ip&proxyUsername=qY1vazyf&userId=fgozupZ8mt7ma05Fr6YRiJRw | unknown | text | 18 b | unknown |
3700 | rundll32.exe | GET | 429 | 195.2.70.38:30001 | http://195.2.70.38:30001/api/helper-first-register?buildVersion=02OO.b2b1Laa&md5=c648901695e275c8f2ad04b687a68ce2&proxyPassword=IhupV2Ip&proxyUsername=qY1vazyf&userId=fgozupZ8mt7ma05Fr6YRiJRw | unknown | text | 18 b | unknown |
3700 | rundll32.exe | GET | 409 | 195.2.70.38:30001 | http://195.2.70.38:30001/api/helper-first-register?buildVersion=02OO.b2b1Laa&md5=c648901695e275c8f2ad04b687a68ce2&proxyPassword=IhupV2Ip&proxyUsername=qY1vazyf&userId=fgozupZ8mt7ma05Fr6YRiJRw | unknown | binary | 1 b | unknown |
3700 | rundll32.exe | GET | 429 | 38.180.61.247:30001 | http://38.180.61.247:30001/api/helper-first-register?buildVersion=02OO.b2b1Laa&md5=c648901695e275c8f2ad04b687a68ce2&proxyPassword=IhupV2Ip&proxyUsername=qY1vazyf&userId=fgozupZ8mt7ma05Fr6YRiJRw | unknown | text | 18 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3700 | rundll32.exe | 38.180.61.247:30001 | — | COGENT-174 | US | unknown |
3700 | rundll32.exe | 94.103.90.9:24565 | — | Hosting technology LTD | RU | unknown |
3700 | rundll32.exe | 94.103.90.9:27863 | — | Hosting technology LTD | RU | unknown |
3700 | rundll32.exe | 195.2.70.38:30001 | — | Hosting technology LTD | RU | unknown |
3700 | rundll32.exe | 91.142.74.28:30001 | — | VIP-TELECOM-SERVICE Ltd. | RU | unknown |
PID | Process | Class | Message |
|---|---|---|---|
3700 | rundll32.exe | A Network Trojan was detected | PROXY [ANY.RUN] GoProxy Check-in |
3700 | rundll32.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
3700 | rundll32.exe | A Network Trojan was detected | PROXY [ANY.RUN] GoProxy Check-in |
3700 | rundll32.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
3700 | rundll32.exe | A Network Trojan was detected | PROXY [ANY.RUN] GoProxy Check-in |
3700 | rundll32.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
3700 | rundll32.exe | A Network Trojan was detected | PROXY [ANY.RUN] GoProxy Check-in |
3700 | rundll32.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
3700 | rundll32.exe | Misc activity | ET USER_AGENTS Go HTTP Client User-Agent |
3700 | rundll32.exe | A Network Trojan was detected | PROXY [ANY.RUN] GoProxy Check-in |